"In general, networks should be configured to deny access to websites such as www.torproject.org"
Blocking Tor exit nodes is one thing, but this is just bizarre. They could make a claim that privacy from your boss is something they wish to prevent, but I saw no such claim. On Thu, 27 Aug 2015 at 14:19 CJ <t...@tengu.ch> wrote: > > > On 08/27/2015 12:51 AM, grarpamp wrote: > > > http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF > > > > IBM Advises Businesses To Block Tor > > > > With Tor-based attacks on the rise, IBM says it's time to stop Tor in > > the enterprise. > > > > New data from IBM's X-Force research team shows steady increase in SQL > > injection and distributed denial-of-service attacks as well as > > vulnerability reconnaissance activity via the Tor anonymizing service. > > > > Well, that's why my exit nodes was, until recently, opened only to > HTTP/HTTPS… Now I've pushed a more opened policy but got abuse mails > from my hosting service the next hours… until I locked down SSH port. > > People using Tor for "bad things" just don't realize how they fuck up > the whole thing. Not even mentioning "weird contents", just the script > kiddies running metasploit/other through Tor. > > Hopefully I'll be able to keep my exit up with the current configuration… > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk